Research article Special Issues

Monotonicity properties arising in a simple model of Wolbachia invasion for wild mosquito populations

  • Received: 20 September 2022 Revised: 20 September 2022 Accepted: 11 October 2022 Published: 26 October 2022
  • In this paper, we propose a simplified bidimensional Wolbachia infestation model in a population of Aedes aegypti mosquitoes, preserving the main features associated with the biology of this species that can be found in higher-dimensional models. Namely, our model represents the maternal transmission of the Wolbachia symbiont, expresses the reproductive phenotype of cytoplasmic incompatibility, accounts for different fecundities and mortalities of infected and wild insects, and exhibits the bistable nature leading to the so-called principle of competitive exclusion. Using tools borrowed from monotone dynamical system theory, in the proposed model, we prove the existence of an invariant threshold manifold that allows us to provide practical recommendations for performing single and periodic releases of Wolbachia-carrying mosquitoes, seeking the eventual elimination of wild insects that are capable of transmitting infections to humans. We illustrate these findings with numerical simulations using parameter values corresponding to the wMelPop strain of Wolbachia that is considered the best virus blocker but induces fitness loss in its carriers. In these tests, we considered multiple scenarios contrasting a periodic release strategy against a strategy with a single inundative release, comparing their effectiveness. Our study is presented as an expository and mathematically accessible tool to study the use of Wolbachia-based biocontrol versus more complex models.

    Citation: Diego Vicencio, Olga Vasilieva, Pedro Gajardo. Monotonicity properties arising in a simple model of Wolbachia invasion for wild mosquito populations[J]. Mathematical Biosciences and Engineering, 2023, 20(1): 1148-1175. doi: 10.3934/mbe.2023053

    Related Papers:

    [1] K. Kefi, Jian Liu . Triple solutions for a Leray-Lions p(x)-biharmonic operator involving Hardy potential and indefinite weight. AIMS Mathematics, 2024, 9(8): 22697-22711. doi: 10.3934/math.20241106
    [2] Wei Guo, Jinfu Yang, Jiafeng Zhang . Existence results of nontrivial solutions for a new p(x)-biharmonic problem with weight function. AIMS Mathematics, 2022, 7(5): 8491-8509. doi: 10.3934/math.2022473
    [3] Abdeljabbar Ghanmi, Abdelhakim Sahbani . Existence results for p(x)-biharmonic problems involving a singular and a Hardy type nonlinearities. AIMS Mathematics, 2023, 8(12): 29892-29909. doi: 10.3934/math.20231528
    [4] Khaled Kefi, Abdeljabbar Ghanmi, Abdelhakim Sahbani, Mohammed M. Al-Shomrani . Infinitely many solutions for a critical p(x)-Kirchhoff equation with Steklov boundary value. AIMS Mathematics, 2024, 9(10): 28361-28378. doi: 10.3934/math.20241376
    [5] Najla Alghamdi, Abdeljabbar Ghanmi . Multiple solutions for a singular fractional Kirchhoff problem with variable exponents. AIMS Mathematics, 2025, 10(1): 826-838. doi: 10.3934/math.2025039
    [6] Xiaojie Guo, Zhiqing Han . Existence of solutions to a generalized quasilinear Schrödinger equation with concave-convex nonlinearities and potentials vanishing at infinity. AIMS Mathematics, 2023, 8(11): 27684-27711. doi: 10.3934/math.20231417
    [7] Famei Zheng . Periodic wave solutions of a non-Newtonian filtration equation with an indefinite singularity. AIMS Mathematics, 2021, 6(2): 1209-1222. doi: 10.3934/math.2021074
    [8] Yuhua Long . Existence and nonexistence of positive solutions to a class of nonlocal discrete Kirchhoff type equations. AIMS Mathematics, 2023, 8(10): 24568-24589. doi: 10.3934/math.20231253
    [9] Qian Li, Qianqian Yuan, Jianhua Chen . An efficient relaxed shift-splitting preconditioner for a class of complex symmetric indefinite linear systems. AIMS Mathematics, 2022, 7(9): 17123-17132. doi: 10.3934/math.2022942
    [10] Dengfeng Lu, Shuwei Dai . On existence results for a class of biharmonic elliptic problems without (AR) condition. AIMS Mathematics, 2024, 9(7): 18897-18909. doi: 10.3934/math.2024919
  • In this paper, we propose a simplified bidimensional Wolbachia infestation model in a population of Aedes aegypti mosquitoes, preserving the main features associated with the biology of this species that can be found in higher-dimensional models. Namely, our model represents the maternal transmission of the Wolbachia symbiont, expresses the reproductive phenotype of cytoplasmic incompatibility, accounts for different fecundities and mortalities of infected and wild insects, and exhibits the bistable nature leading to the so-called principle of competitive exclusion. Using tools borrowed from monotone dynamical system theory, in the proposed model, we prove the existence of an invariant threshold manifold that allows us to provide practical recommendations for performing single and periodic releases of Wolbachia-carrying mosquitoes, seeking the eventual elimination of wild insects that are capable of transmitting infections to humans. We illustrate these findings with numerical simulations using parameter values corresponding to the wMelPop strain of Wolbachia that is considered the best virus blocker but induces fitness loss in its carriers. In these tests, we considered multiple scenarios contrasting a periodic release strategy against a strategy with a single inundative release, comparing their effectiveness. Our study is presented as an expository and mathematically accessible tool to study the use of Wolbachia-based biocontrol versus more complex models.



    In recent years, the development of smart environments promises a revolution for most kinds of human-related activities. The smart environment is a physical world that is richly and invisibly interwoven with sensors, actuators, displays, and computational elements, embedded seamlessly in the everyday objects of our lives, and connected through a continuous network [1]. Nowadays, the practical realization of smart environments has only become possible due to the fast-developing of the computer technology such as Internet of Things (IoT) [2,3] and Cloud Computing(CC) [4,5]. Particularly, benefits of the IoT and its relevant technologies can seamlessly integrate classical networks with networked instruments and devices [6]. The IoT is therefore the most fundamental enabler of smart environments, such as smart homes, smart buildings, smart cities and smart factories, among others [7].

    The Internet of Things can be realized in three aspects: Internet-oriented (middleware), things-oriented (sensors) and semantic-oriented (knowledge) [8]. Among them, sensors are the basic equipment in the IoT, and they are used increasingly more. Data mining is the key technology for acquiring knowledge from the data that are collected by sensors, and it involves discovering novel, interesting, and potentially useful patterns and applying algorithms to the extraction of hidden information [9]. In the IoT, a large amount of data that are collected by the bottom sampling equipment is in the form of time series—which is a collection of values that are obtained from sequential measurements over time. Therefore, time series analysis is a hot research area in data mining in the IoT.

    In the IoT, the correlation of time series can reflect the relationships of different objects, such as the collaborative relationship between manufacturing equipment, the similarity of geographic information between different environmental monitoring sites, and the correlation of electricity consumption between different buildings. In the IoT, studying the problem of time series correlation mining between different objects is of great significance for equipment anomaly detection, attribute value prediction, resource optimization, etc. For example, the correlation information of the daily electricity time series between different buildings from an area can provide a basis for optimizing the electricity price setting and power facility configuration [10]. The existing body of research on the correlation of time series suggests that correlation subsequences can be obtained based on similarity measurements. However, some methods fail to obtain clusters of related subsequences, such as the methods in [11,12]. In addition, the existing methods based on clustering algorithms may obtain inaccurate results and long computation times when mining the time series correlations from different objects, analyzing the correlation in the same time series, such as the method in [13]. Consequently, an effective clustering method is needed to analyze the correlation between different time series, which is more helpful for discovering the hidden behavioral relations between different objects in smart environments based on the IoT.

    In this paper, a novel clustering algorithm named the CPCCM (clustering algorithm for time-series data based on precise correlation coefficient matching in the IoT) is presented. In this method, only the correlation between subsequences from different initial sequences should be computed in the density clustering process of subsequences while adjacent subsequences in the same cluster should be connected. Through the method that is proposed by this paper, clusters of high correlation subsequences from the time series of different objects in the IoT will be obtained, which will provide a basis for mining the hidden behavioral relations between objects.

    The contributions of the proposed in this paper are as follows.

    (1) To solve the problem of behavior analysis between different objects in smart environments, based on the IoT, a novel clustering algorithm for time-series data based on precise correlation coefficient matching is proposed. The proposed algorithm improves the cluster quality by matching the correlation coefficients between any pair of subsequence sets from two different time series.

    (2) The proposed algorithm is independent of specific development tools and platforms, so it can be flexibly applied to similar scenarios.

    The remainder of the article is organized as follows. In Section Ⅱ, a survey of the related work is presented, and the relative pros and cons of different related approaches are discussed. In Section Ⅲ, by analyzing the time series and its correlation coefficient, a mathematical description of the problem is presented. In Section Ⅳ, density clustering modeling based on precise correlation coefficient matching in the IoT is introduced. The evaluation criteria, the design of the experiments and the results are presented in Section Ⅴ. Finally, in Section Ⅵ, the work of this paper is summarized.

    The fast-developing and expanding area known as the Internet of Things (IoT) involves expanding the Internet beyond the connection of various physical devices and objects [14]. The existing research topics are wide, including security and privacy issues in the IoT [15,16,17], the captured, stored, and managed big data in the IoT [18,19,20], the efficient digital media transmission [21,22], efficient energy and resource management [23,24,25], etc. To make the IoT smarter, lots of analysis technologies have been introduced into the IoT, and one of the most valuable technologies is data mining [9].

    In the smart environments based on the IoT, the data that are collected by IoT devices are in the form of time series [26]. Therefore, time series analysis is an important task in IoT data mining. Time series analysis in the IoT has been applied to smart cities [22,27], environmental monitoring [11,12,13,28,29,30], industry and manufacturing [31,32,33,34], smart grids [35,36,37,38,39,40,41] and other research fields. In [27], to handle the large amount of heterogeneous data and sensory information in smart cities, a time series agammaegation method is proposed to agammaegate and represent the original data in an efficient and higher-granularity form. In environmental monitoring, the sea surface temperature (SST) time series [28] and air quality index time series [12,13] that are collected by IoT sensors are used for anomaly detection and prediction analysis. In [31,32,33], the methods based on the time series of resource services and their feature sequences are proposed to analyze the service selection and composition of cloud manufacturing in collaborative tasks. With respect to smart grids, in [36,37], time series of wind speeds and power outputs with respect to wind power generation are studied and analyzed. In addition, in [39,40,41], time series of power prices and loads are studied and analyzed.

    Correlation analysis is an important part of time series analysis [42]. In recent years, increasingly more scholars have paid attention to this research direction. In [11], a method based on the traditional geophysical time series prediction model is proposed, which calculates the spatial correlation across several sites and the time correlation within each site to improve the accuracy of dynamic time series prediction. In [12,35], the proposed approaches studied the lag correlation between time series. In [37], mutual information was proposed to quantitatively evaluate the correlation and predictability of wind speed series and to improve the forecast accuracy. In [39], the proposed method developed a novel cross-correlation coefficient to explore the existence of asymmetric cross-correlation between two time series. In [43], a method based on the ARIMA model is proposed, which calculates the correlation of multivariate QoS time series to improve the quality of the QoS prediction in the service composition problem. In these methods, the time-series models can be improved by incorporating various correlation coefficients into similarity measurements. However, most of them focus only on resolving the correlation between two single sequences rather than two sets of sequences. Consequently, the correlation cannot be completely mined. To overcome the shortcoming, a method based on hierarchical clustering is proposed to analyze the time series that are formed by air quality monitoring, which uses the Pearson correlation coefficient and Euclidean distance as the distance metric for time series data [13]. In [41], a method based on the weighed Pearson distance is proposed to divide the huge load curve time series into several clusters since the load curves of the same cluster have similar power consumption patterns. In [44], a method based on the Copula clustering model is proposed, which allows one to extend the usual clustering methods for time series based on Pearson's correlation coefficient. All the clustering algorithms can find meaningful subsequence pattern. However, there are redundant scanning in their algorithms to reduce the performance of the algorithms.

    As described above, the current works on time series correlation analysis are mostly based on time series similarity measures. However, some of these methods cannot obtain correlation clusters from different time series subsequences, and some pay attention to the redundant correlation information when using clustering algorithms.

    A sequence is often the result of the observation of an underlying process in the IoT. In this process, according to a given sampling rate, data are collected by sensors at uniformly spaced time moments. Thus, a sequence can be defined as a set of contiguous time moments.

    Definition 1 Initial sequence. An initial sequence T is an ordered sequence of n real-valued variables, which can be expressed as T = (t1, t2, …, tn), where tiR. The initial sequence can cover all the observation data that are obtained and can be quite long. Therefore, it is meaningful to consider the subsequences of a sequence.

    Definition 2 Subsequence. The subsequence S of the initial sequence T = (t1, t2, …, tn) can be defined as S(T)k = (tk, tk+1, …, tk+m-1), where 1 ≤ kn -m +1.The set of all subsequences of length m from T can be denoted as SmT.

    Definition 3 Adjacent subsequences. For subsequences S(T)i = (ti, ti+1, …, ti+m-1) and S(T)j = (tj, tj+1, …, tj+m-1) from the same sequence T = (t1, t2, …, tn), if j-I = 1, the subsequence S(T)j and S(T)i are adjacent subsequences, and S(T)j is S(T)i subsequent subsequence, which is denoted as S(T)iS(T)j.

    Definition 4 Correlation ρ-neighborhood. For the subsequence S(X)i from the sequence X, the correlation ρ-neighborhood is a subsequence set whose correlation coefficient with S(X)i is greater than ρ, and these subsequences do not from the sequence X. That is, Nρ(S(X)i)={SjSD1l|X|SlX|r(Si,Sj)ρ}, if a negative correlation is considered, then, Nρ(S(X)i)={SjSD1l|X|SlX|r(Si,Sj)ρ}, where SD is a subsequence data set, r(Si, Sj) is a function for calculating the correlation between the subsequence Si and Sj, and |X| is the length of the sequence X.

    Definition 5 Subsequence correlation clustering. For a given multiple initial sequence and correlation function r(Si, Sj), find the set of clusters C = {ci} where ci = { Sk | SkSD } is a set of subsequences from different initial sequences within the same cluster that are more correlated than the subsequences of different clusters.

    The problem that we want to solve in this paper is to obtain the correlation clusters of subsequences C. By our method, the quality of the clusters can be improved.

    For the initial sequence data T = (t1, t2, …, tn), which are collected from the sensors of the sampling site, first, the sliding window is adopted. Using a given time window length l, one unit length is sequentially slid from the first recording point until all points of the initial sequence are traversed, as shown in Figure 1.

    Figure 1.  Sliding window split subsequence.

    The subsequence of the initial sequence T that is split by the sliding window is S(T)i = (ti, ti+1, …, ti+l-1), where i = 1, 2, …, n - l + 1. There are n - l + 1 subsequences in total, and the set of these subsequences is SlT.

    For two given initial sequences X and Y and a time window length l, after the subsequence sets SlX and SlY are obtained by dividing the subsequences using the sliding window described above, the correlation coefficient between subsequences S(X)i and S(Y)j is calculated by the correlation function r(S(X)i, S(Y)j), where 1 ≤ In - l + 1 and 1 ≤ jn - l + 1. In this paper, we use Pearson's correlation coefficient as the measure of the correlation between subsequences. Therefore, r(S(X)i, S(Y)j) can be calculated by Eq 1.

    r(S(X)i,S(Y)j)=Cov(S(X)i,S(Yj)σS(X)iσS(Y)j (1)

    where Cov(S(X)i, S(Y)j) is the covariance of subsequences S(X)i and S(Y)j, and σ is their standard deviation. Pearson's correlation coefficient is a popular method to investigate the cross-correlation between sequences because it can be computed with just a linear scan and it is scale and offset invariant. Pearson's correlation coefficient reflects the trend of the sequence with respect to the similarity. Pearson's correlation coefficient's range is [-1, 1]. When the two subsequences are positively correlated, the Pearson correlation coefficient will be positive, and negatively correlated subsequences have a negative Pearson correlation coefficient. Furthermore, the larger that the absolute value of Pearson's correlation coefficient is, the greater the correlation between the subsequences.

    For the subsequence sets that are obtained by the above method and the correlation coefficient calculation function given by Eq 1, clustering is performed using a method that precisely matches the correlation coefficients between subsequences from different initial sequences. And adjacent subsequences are combined during the clustering process to obtain longer subsequences.

    When calculating the correlation coefficient of the merged subsequences, the length of the subsequences may be unequal. At this time, the shorter sequence can be used as a sliding window for correlation matching, and the correlation coefficient between them can be calculated by Eq 2.

    r(Su,Sv)=|Sv||Su|+1i=1r(Sv,Sui)|Sv||Su|+1 (2)

    where Su and Sv are two subsequences from different initial sequence and their lengths are not equal. We assume that |Sv| > |Su|, that is, the length of the subsequence Sv is greater than Su. Then, the subsequence Sv is split into the subsequence Sv, where i = 1, 2, …, |Sv| - |Su| + 1, with a window length |Su|.

    The strategy of precise matching is to match any pair of subsequences from different initial sequences completely with the giving threshold during the clustering process. The main idea of the CPCCM is that in each round of precise matching, the efficient clustering of all subsequences is accomplished using a cross-traversal strategy. For the subsequence S(X)i, first by traversing, the subsequences in the ε-neighborhood are clustered into positive correlation clusters and the subsequences in the-ε-neighborhood are clustered into negative correlation clusters. Then, by traversing, the intersections of the ε-neighborhoods of the subsequences in the positive correlation cluster are found, and we merge them into the positive correlation cluster. In addition, the intersections of the-ε-neighborhoods of the subsequences in the negative correlation cluster are found, and we merge them into the negative correlation cluster.

    Take Figure 2 as an example. One cross-traversal round starting with S(X)1 is as follows. Find the subsequences in the ε-neighborhood of S(X)1, which are S(Y)3 and S(Y)6, and classify them into the positive correlation cluster of S(X)1. Then, find the subsequences in the-ε-neighborhood of S(X)1, which are S(Y)2, S(Y)4, and S(Y)5, and classify them into the negative correlation cluster of S(X)1. S(Y)4 and S(Y)5 are adjacent subsequences, and so they are combined. Then, find the intersection of the ε-neighborhoods of S(Y)3 and S(Y)6, which is S(X)6, and classify it into the positive correlation cluster of S(X)1. Next, find the intersections of the-ε-neighborhoods of S(Y)2 and S(Y)4, which are S(X)3 and S(X)5, and classify them into the negative correlation cluster of S(X)1. At this point, the positive correlation cluster in this round is { S(X)1, S(Y)3, S(Y)6, S(X)6}, and the negative correlation cluster is { S(X)1, S(Y)2, S(Y)4, S(X)3, S(X)5}.

    Figure 2.  Cross traversal during a round of clustering.

    For a given correlation threshold ε and subsequence sets SlX and SlY, the specific steps of the CPCCM algorithm's iterative execution are as follows.

    Step 1: Initialize the final cluster sets C+= and C=.

    Step 2: Extract a subsequence S(X)i from subsequence set SlX. By traversing SlY, we get the ε-neighborhood of S(X)i as Nε(S(X)i) and the -ε-neighborhood of S(X)i as Nε(S(X)i) through Eq 1, Eq 2 and Definitions 4. Then, Nε(S(X)i) is clustered into positive correlation clusterc+k; Nε(S(X)i) is clustered into the negative correlation cluster Nε(S(X)i), and the adjacent subsequences are merged in the clustering process.

    Step 3: Delete subsequence S(X)i from set SlX.

    Step 4: By traversing SlX, for each subsequence of Nε(S(X)i), get their ε-neighborhoods using Eq 1, Eq 2 and Definitions 4, find their intersection, and add the intersection to the positive correlation cluster c+k. Next, for each subsequence of Nε(S(X)i), get their -ε-neighborhoods using Eq 1, Eq 2 and Definitions 4, find their intersection, and add the intersection to the negative correlation cluster cs.

    Step 5: Positive correlation cluster c+k is merged into C+, and negative correlation cluster cs is merged into C.

    Step 6: For each subsequence Sj in positive correlation cluster c+k or negative correlation cluster cs, it is judged whether it is contained in both set C+ and set C. If so, subsequence Sj is deleted from SlX or SlY.

    Step 7: Go back to step 2 and repeat while SlX or SlY is null.

    The pseudocode of CPCCM is shown in Algorithm 1.

    Algorithm 1.
    Input: The two initial sequences and the correlation threshold ε(ε>0);
    Output: The positive correlation cluster set C+={c+1,,c+m}, and the negative correlation cluster set C={c1,,cn}
    1: C+=,C=
    2:   while (SlX)
    3:     while (SlY)V // if the set SlY is not null, traversing SlY
    4:     if (S(Y)jNε(S(X)i)) then //if S(X)i is positively correlated with S(Y)j
    5:        ck+ck+{ S(X)i}
    6:        ck+ck+{S(Y)j}    // subsequences are clustered into positive correlation cluster ck+
    7:        End if
    8:        Else if (S(Y)jN-ε (S(X)i)) then //else if S(X)iis negatively correlated with S(Y)j
    9:          cs-cs-{ S(X)i}
    10:          cs-cs-{S(Y)j} // subsequences are clustered into negative correlation cluster cs-
    11:        End else if
    12:        if ({S(Y)j}C+ and {S(Y)j}C) then //if the subsequence S(Y)j has been in positive correlation cluster and negative correlation cluster
    13:        SlYSlY{S(Y)j} // S(Y)j is removed from the set SYl
    14:        End if
    15:      End while
    16:      SlXSlX{S(X)i}    //S(X)i is removed from the set SXl
    17:      while (SlX)
    18:        if (S(X)pNε(c+k)) then // if S(X)p is positively correlated with any sequence of ck+
    19:        ck+ck+{ xp}
    20:        ck+←JoinOn(ck+) // Merge two adjacent subsequences which from the same initial sequence into a new long subsequence
    21:        End if
    22:        Else if (S(X)pNε(c+k)) then// if S(X)p is negatively correlated with any subsequence of cs-
    23:        cs-cs-{S(X)p},
    24:        cs-←JoinOn(Rs-)
    25:        End else if
    26:      if ({S(X)p}C+ and {S(X)p}C) then SlXSlX{S(X)p} // if subsequence S(X)p is in positive correlation cluster and negative correlation cluster, S(X)p is removed from the set SXl
    27:      End while
    28:    C+C+ck+, C-C-cs-, k++, s++
    29:  End while
    30:  return C+, C-

    If n is the number of records in the sequence and l is the given time window length, the time complexity of the algorithm is O(n-l) in the best case and the O((n-l)2) in the worst case. In the best case, the first subsequence from one initial sequence is positively or negatively correlated with all the adjacent subsequences from the other initial sequence. Due to merging all the adjacent subsequences after the first traversal, only n-l matches are needed. So the time complexity is O(n-l). In the worst case, adjacent subsequences cannot be merged during the clustering process, so that the time complexity is O((n-l)2).

    The data set of the experiment is collected from a college in China. To achieve energy savings and emission reductions, in this college, more than 2, 000 sensors were installed on the electricity meters in more than 20 buildings. The data is collected at 30 min intervals from March 1, 2016 to June 27, 2016. From the entire electricity consumption dataset, we choose one sensor, and there are 5680 electricity consumption data points for this sensor. The data format is shown in Table 1.

    Table 1.  Data format of electricity consumption.
    time(Y-M-D H:M:S) digits of electricity meter
    2016-03-01 11:10:07.0 157212.0
    2016-03-01 11:40:08.0 157218.0
    2016-03-01 12:10:09.0 157225.2
    2016-03-01 12:40:10.0 157234.8
    2016-03-01 13:10:11.0 157240.2
    2016-03-01 13:40:12.0 157244.4

     | Show Table
    DownLoad: CSV

    To analyze the correlation of the electricity consumption between different buildings, all the data should be preprocessed and converted to electricity consumption sequences. In Table 1, the times represent the ordered relationship among the digits of the electricity meter, and so the electricity consumption sequence can be represented by the difference in the sequence of the digits of the electricity meter. After preprocessing the data in Table 1, the electricity consumption sequence should be (6, 7.2, 9.6, 5.4, 4.2).

    The simulation experiment has two steps: 1) splitting subsequence by sliding window; and 2) running CPCCM algorithm and verifying the validity of the clustering results.

    Step 1) Splitting subsequence by sliding window.

    In this paper, the time window length is set to 24. The electricity consumption sequence is split into 5557 subsequences by the sliding window method described in Sec 4.1. Only the first five subsequences are displayed, as shown in Table 2.

    Table 2.  Subsequence format of electricity consumption.
    subsequence number subsequences from initial sequence X
    1 (6, 7.2, 9.6, 5.4, 4.2, 4.2, 4.8, 7.8, 7.8, 7.8, 9, 11.4, 11.4, 13.8, 14.4, 15.6, 16.2, 17.4, 13.2, 14.4, 14.4, 13.8, 12, 4.2)
    2 (7.2, 9.6, 5.4, 4.2, 4.2, 4.8, 7.8, 7.8, 7.8, 9, 11.4, 11.4, 13.8, 14.4, 15.6, 16.2, 17.4, 13.2, 14.4, 14.4, 13.8, 12, 4.2, 2.4)
    3 (9.6, 5.4, 4.2, 4.2, 4.8, 7.8, 7.8, 7.8, 9, 11.4, 11.4, 13.8, 14.4, 15.6, 16.2, 17.4, 13.2, 14.4, 14.4, 13.8, 12, 4.2, 2.4, 1.8)
    4 (5.4, 4.2, 4.2, 4.8, 7.8, 7.8, 7.8, 9, 11.4, 11.4, 13.8, 14.4, 15.6, 16.2, 17.4, 13.2, 14.4, 14.4, 13.8, 12, 4.2, 2.4, 1.8, 1.2)
    5 (4.2, 4.2, 4.8, 7.8, 7.8, 7.8, 9, 11.4, 11.4, 13.8, 14.4, 15.6, 16.2, 17.4, 13.2, 14.4, 14.4, 13.8, 12, 4.2, 2.4, 1.8, 1.2, 1.2)

     | Show Table
    DownLoad: CSV

    Step 2) Running CPCCM algorithm and verifying the validity of the clustering results.

    Using the two subsequence sets from different buildings, the CPCCM-based experiment was done three times. We set the time window to 24, and set different correlation thresholds to 0.75, 0.8, and 0.9, respectively. To analyze the frequent correlation between subsequences, we use the positive correlation cluster and the negative correlation cluster in each clustering result to select the ten clusters with the largest number of elements in each cluster as the final result.

    To verify the validity of the clustering results, the correlation coefficient of the intra-cluster subsequences (corrintra) and the correlation coefficient of the inter-cluster subsequences (corrinter) are calculated for each of the major clusters. corrintra is the average of the correlation coefficients between the subsequences in a cluster, and corrinter is the average of the correlation coefficients between the cluster subsequence and other cluster subsequences. For cluster c, its corrintra and corrinter can be calculated by equations 3 and 4, respectively.

    corrintra(c)=ncXi=1ncYj=1r(s(X)cis(Ycj)ncX×ncY (3)

    where ncX is the number of subsequences from sequence X in cluster c, and S(X)ci is the i-th subsequence from sequence X in cluster c.

    corrinter(c)=1m1cCcncXi=1ncYj=1r(s(X)ci,S(Y)cj)+ncXi=1ncYj=1r(s(X)ci,S(Y)cj)ncX×ncY+ncX×ncY (4)

    where c is a cluster that is different from cluster c in the final clustering result set, and m is the number of clusters in the final clustering result.

    The positive correlation cluster and the negative correlation cluster are calculated separately, and the results(to 4 decimal places) are shown in Tables 3 and 4.

    Table 3.  The corrintra and corrinter of the positive correlation clusters with each threshold.
    Top 10 largest clusters positive correlation with ε = 0.75 positive correlation with ε = 0.8 positive correlation with ε = 0.9
    corrintra corrinter corrintra corrinter corrintra corrinter
    c1 0.8017 0.1850 0.8347 0.2362 0.9123 0.2895
    c2 0.7886 0.1568 0.8217 0.1995 0.9095 0.2505
    c3 0.7924 0.1876 0.8254 0.2324 0.9102 0.3088
    c4 0.7760 0.1390 0.8315 0.2608 0.9134 0.2628
    c5 0.7853 0.1585 0.8207 0.1977 0.9090 0.2294
    c6 0.7729 0.1820 0.8259 0.1483 0.9123 0.3049
    c7 0.7825 0.1697 0.8218 0.2168 0.9163 0.3127
    c8 0.7737 0.1117 0.8325 0.1885 0.9150 0.1978
    c9 0.7796 0.1665 0.8472 0.1400 0.9138 0.3006
    c10 0.7749 0.1614 0.8159 0.1393 0.9161 0.1764

     | Show Table
    DownLoad: CSV
    Table 4.  The corrintra and corrinter of the negative correlation clusters with each threshold.
    Top 10 largest clusters negative correlation with ε = 0.75 negative correlation with ε = 0.8 negative correlation with ε = 0.9
    corrintra corrinter corrintra corrinter corrintra corrinter
    c1 -0.7913 -0.2474 -0.8227 -0.2161 -0.9130 -0.3112
    c2 -0.7846 -0.1923 -0.8334 -0.3034 -0.9108 -0.3785
    c3 -0.7840 -0.2498 -0.8224 -0.2446 -0.9150 -0.2679
    c4 -0.7941 -0.2165 -0.8289 -0.2778 -0.9088 -0.4079
    c5 -0.7746 -0.1162 -0.8197 -0.2664 -0.9141 -0.2806
    c6 -0.7754 -0.2317 -0.8240 -0.1630 -0.9151 -0.2674
    c7 -0.7772 -0.2362 -0.8164 -0.2917 -0.9184 -0.2492
    c8 -0.7815 -0.2217 -0.8208 -0.2214 -0.9115 -0.3874
    c9 -0.7806 -0.1533 -0.8289 -0.1634 -0.9144 -0.3806
    c10 -0.7672 -0.2442 -0.8314 -0.2099 -0.9092 -0.2487

     | Show Table
    DownLoad: CSV

    As shown in Tables 3 and 4, for each run's result, the number of elements is ranked in the top ten clusters, and each cluster has | corrintra | > |ε| and | corrinter | < |ε|. This indicates that the clustering results have high correlation between the subsequences within the cluster, and the correlation between the subsequences of different clusters is low, thus indicating that the clustering algorithm is effective. In addition, the electricity consumption-time sequence diagrams of the clusters with the most subsequences under each threshold operation result in Tables 3 and 4 are drawn, as shown in Figure 3. 3a, 3b and 3c are the positive correlation clusters, and 3d, 3e, and 3f are the negative correlation clusters. 3a and 3d are the results with the threshold of ε = 0.75, 3b and 3e are the results with the threshold of ε = 0.8, and 3c and 3f are the results with the threshold of ε = 0.9.

    Figure 3.  The electricity-time diagram of the cluster with the most subsequences in the CPCCM clustering result with different thresholds.

    From Figure 3, we can find that the CPCCM algorithm can classify subsequences with similar electricity consumption into one class, and the trend of the correlation relationship that is presented in the clustering results is more practical-even if some subsequences do not overlap on the coordinate axes but they have similar (e.g., 3a-c) or opposite (e.g., 3d-f) trends. Moreover, in Figure 3, the lower the threshold is, the greater the number of subsequences, and the longer the length of the merged subsequences. Conversely, the higher the threshold is, the less the number of subsequences, and the trend between the subsequences from the different initial sequences is more similar (such as 3c) or the opposite (such as 3f), which means that the positive or negative correlation between subsequences is more obvious.

    The agglomerative hierarchical clustering (AHC) algorithm is a popular solution for subsequence correlation clustering. For example, in [13], the temporal sequence correlation of air quality testing sites using AHC algorithm is analyzed to evaluate the similarity of these testing sites. And in [41], several user consumption models is found for load curve time series data using the AHC algorithm based on Pearson similarity.

    AHC is a bottom-up clustering method. The main steps can be demonstrated as follows: 1) assign N subsequences to N clusters where each cluster only contains one subsequence; 2) find the closest pair of clusters and merge them into a cluster; 3) compute distances between the clusters; and 4) repeat step 2) and step 3) until all items are clustered into a cluster or reach the specified termination condition.

    The comparison is designed as follows. First, using the same data set, the AHC-based experiment was done three times. We set the time window as 24, and set different correlation thresholds of 0.75, 0.8, and 0.9, respectively. The electricity consumption-time diagrams of the clusters with the most elements under each threshold based on the subsequences are shown in Figure 4. 4a, 4b and 4c are the positive correlation clusters, and 4d, 4e, and 4f are the negative correlation clusters. 4a and 4d are the results with the threshold of ε = 0.75, 4b and 4e are the results with the threshold of ε = 0.8, and 4c and 4f are the results with the threshold of ε = 0.9.

    Figure 4.  The electricity-time diagram of the cluster with the most subsequences in the AHC clustering result with different thresholds.

    Comparing the running results of the hierarchical clustering algorithm in Figure 4 and the CPCCM running results in Figure 3, we can intuitively find that under the same threshold, the CPCCM method mines more long subsequences than the hierarchical clustering algorithm. Furthermore, in the high correlation threshold mining, the CPCCM method mines more subsequence pairs than the hierarchical clustering algorithm, as shown by 3c, 4c, 3f, and 4f.

    To quantitatively verify our algorithm, we consider the MHΓ-Modified Hubert's Γ Statistic [45] and the DVI-Dunn's Validity Index [46] to assess the quality of the resulting clusters. Both of these assessment methods are classical methods for judging clustering quality by comparing the resulting cluster structure with other clustering results for the same data set. The modified Hubert's Γ index is given by the following:

    MHΓ=1Mnimj=i+1P(S(X)i,S(Y)j)Q(S(X)i,S(Y)j) (5)

    where M = n × m; n and m respectively represent the number of subsequences from the initial sequence X and Y in the clustering result, assuming that nm; P is the proximity matrix; and Q is a n × m matrix, where each Q(S(X)i, S(Y)j) is the distance between the clusters to which S(X)i and S(Y)j belong. The distance between two clusters c1 and c2 can be calculated by Eq 6.

    dist(c1,c2)=nc1Xi=1nc2Yj=11|r(S(X)c1i,S(Y)c2j)|+nc2Xi=1nc1Yj=11|r(S(X)c2i,S(Y)c1j)|nc1X×nc2Y+nc2X×nc1Y (6)

    where nc1X is the number of subsequences from sequence X in cluster c1,nc2Y is the number of subsequences from sequence Y in cluster c2,S(X)c1i is the i-th subsequence from sequence X in cluster c1,1inc1X, r(S(X)i , S(Y)j) is the Pearson correlation coefficient between S(X)c1i and S(Y)c2j that can be calculated through Eq 1 or 2.

    High values of the MHΓ index represent compact and well-separated clustering result, That is, there are more correlated between the subsequences within same cluster than the subsequences from different clusters. It is especially well suited for detecting compact and well-separated clusters, but it has the drawback of being dependent on the number of clusters. The DVI criterion does not depend on the number of clusters but it is more unstable than the MHΓ since it is based on single linkage distances. Therefore, we choose the average linkage distances to calculate the distance between two clusters, as shown in Eq 6. Dunn's Validity Index is given as follows:

    DVI=mini,j{dist(ci,cj)maxk{diam(ck)}} (6)

    where diam(ck) is the diameter of cluster ck, i.e., the maximum distance of the subsequences in cluster ck. High values of this index also represent compact and well-separated clusters.

    Using Eq 5 and 7, the CPCCM algorithm and the AHC algorithm are used to calculate the MHΓ and DVI indicators in the positive correlation and the negative correlation top ten clusters, respectively, under the respective thresholds, and then the index values of the positive correlation clusters under the same operation of the same algorithm are obtained. Next, we add the index values that are obtained by the negative correlation cluster, and the results that are obtained are shown in Figures 5 and 6.

    Figure 5.  A comparison of the MHΓs of the AHC and CPCCM.
    Figure 6.  A comparison of the DVIs of the AHC and CPCCM.

    It can be seen from Figures 5 and 6 that the MHΓ and DVI index values of the CPCCM algorithm under the various thresholds are greater than or similar to the AHC algorithm results. Moreover, it can be found that under a high correlation threshold (such as 0.9), the difference between the evaluation index values of the CPCCM algorithm and the AHC algorithm is the largest, which indicates that the clustering quality of the CPCCM algorithm is more advantageous than the AHC algorithm when assessing the high correlation subsequence cluster set. Therefore, through the comparison experiments, it can be found that the CPCCM algorithm is efficient and accurate for solving the problem of time series subsequence correlation clustering.

    To analyze the time series correlation of different objects in smart environments based on the Internet of Things, a time series clustering algorithm based on precise correlation coefficient matching (CPCCM) is proposed. After splitting the initial sequence that is acquired from the sensor using a sliding window, the algorithm performs precise correlation coefficient matching on the subsequences from different objects, clusters the subsequences that meet some preset threshold for the Pearson correlation coefficients, and merges the adjacent subsequences in the clustering process to obtain longer subsequences. Finally, the effectiveness of the method is verified using practical smart grid use cases and comparative experiments.

    The merits of the proposed approach are as follows: 1) by using the strategy of precise matching and cross-traversal, the proposed algorithm improves the clustering quality, by merging adjacent subsequences, the complexity of the algorithm is reduced; and 2) the proposed algorithm is independent of specific development tools and platforms, so it can be flexibly applied to similar scenarios. However, the complexity of the algorithm will be increased in a higher dimension time series than in 1-dimension. In addition, in our method, time series should be kept continuous. If some segments are missing, they must be filled through some methods. The future work will focus on algorithm for high-dimensional time series data and reducing its complexity. We will apply the algorithm for high-dimensional time series data to intelligent manufacturing as sequence of resource service has varying number of dimensions.

    This work was supported in part by a grant from JZ160409 of the Natural Foundation Key Program for Young Scholars in the Universities of Fujian Province, 2018C110R of the Quanzhou City Science & Technology Plan of China, and 2019H01010129, 2019H0017 of the Fujian Province Science and Technology Plan.

    The authors declare that there is no conflict of interests regarding the publication of this article.



    [1] A. Hoffmann, B. Montgomery, J. Popovici, I. Iturbe-Ormaetxe, P. Johnson, F. Muzzi, et al., Successful establishment of Wolbachia in Aedes populations to suppress dengue transmission, Nature, 476 (2011), 454–457. https://doi.org/10.1038/nature10356 doi: 10.1038/nature10356
    [2] C. McMeniman, R. Lane, B. Cass, A. Fong, M. Sidhu, Y.-F. Wang, et al., Stable introduction of a life-shortening Wolbachia infection into the mosquito Aedes aegypti, Science, 323 (2009), 141–144. https://doi.org/10.1126/science.1165326 doi: 10.1126/science.1165326
    [3] L. Moreira, I. Iturbe-Ormaetxe, J. Jeffery, G. Lu, A. Pyke, L. Hedges, et al., A Wolbachia symbiont in Aedes aegypti limits infection with dengue, chikungunya, and plasmodium, Cell, 139 (2009), 1268–1278. https://doi.org/10.1016/j.cell.2009.11.042 doi: 10.1016/j.cell.2009.11.042
    [4] T. Ruang-Areerate, P. Kittayapong, Wolbachia transinfection in Aedes aegypti: a potential gene driver of dengue vectors, Proc. Natl. Acad. Sci. U.S.A., 103 (2006), 12534–12539. https://doi.org/10.1073/pnas.0508879103 doi: 10.1073/pnas.0508879103
    [5] T. Walker, P. Johnson, L. Moreira, I. Iturbe-Ormaetxe, F. Frentiu, C. McMeniman, et al., The wMel Wolbachia strain blocks dengue and invades caged Aedes aegypti populations, Nature, 476 (2011), 450–453. https://doi.org/10.1038/nature10355 doi: 10.1038/nature10355
    [6] L. Almeida, Y. Privat, M. Strugarek, N. Vauchelet, Optimal releases for population replacement strategies: application to Wolbachia, SIAM J. Math. Anal., 51 (2019), 3170–3194. https://doi.org/10.1137/18M1189841 doi: 10.1137/18M1189841
    [7] C. McMeniman, S. O'Neill, A virulent Wolbachia infection decreases the viability of the dengue vector Aedes aegypti during periods of embryonic quiescence, PLoS Negl. Trop. Dis., 4 (2010), e748. https://doi.org/10.1371/journal.pntd.0000748 doi: 10.1371/journal.pntd.0000748
    [8] S. Ritchie, M. Townsend, C. Paton, A. Callahan, A. Hoffmann, Application of wMelPop Wolbachia strain to crash local populations of Aedes aegypti, PLoS Negl. Trop. Dis., 9 (2015), e0003930. https://doi.org/10.1371/journal.pntd.0003930 doi: 10.1371/journal.pntd.0003930
    [9] L. Almeida, A. Haddon, C. Kermorvant, A. Léculier, Y. Privat, M. Strugarek, et al., Optimal release of mosquitoes to control dengue transmission, ESAIM: Proc. Surv., 67 (2020), 16–29. https://doi.org/10.1051/proc/202067002 doi: 10.1051/proc/202067002
    [10] J. Schraiber, A. Kaczmarczyk, R. Kwok, M. Park, R. Silverstein, F. Rutaganira, et al., Constraints on the use of lifespan-shortening Wolbachia to control dengue fever, J. Theor. Biol., 297 (2012), 26–32. https://doi.org/10.1016/j.jtbi.2011.12.006 doi: 10.1016/j.jtbi.2011.12.006
    [11] M. Turelli, Cytoplasmic incompatibility in populations with overlapping generations, Evolution, 64 (2010), 232–241. https://doi.org/10.1111/j.1558-5646.2009.00822.x doi: 10.1111/j.1558-5646.2009.00822.x
    [12] D. E. Campo-Duarte, D. Cardona-Salgado, O. Vasilieva, Establishing wMelPop Wolbachia infection among wild Aedes aegypti females by optimal control approach, Appl. Math. Inf. Sci., 11 (2017), 1011–1027. https://doi.org/10.18576/amis/110408 doi: 10.18576/amis/110408
    [13] D. E. Campo-Duarte, O. Vasilieva, D. Cardona-Salgado, Optimal control for enhancement of Wolbachia frequency among Aedes aegypti females, Int. J. Pure Appl. Math., 112 (2017), 219–238.
    [14] D. Contreras-Julio, P. Aguirre, J. Mujica, O. Vasilieva, Finding strategies to regulate propagation and containment of dengue via invariant manifold analysis, SIAM J. Appl. Dyn. Syst., 19 (2020), 1392–1437. https://doi.org/10.1137/20M131299X doi: 10.1137/20M131299X
    [15] A. Fenton, K. Johnson, J. Brownlie, G. Hurst, Solving the Wolbachia paradox: modeling the tripartite interaction between host, Wolbachia, and a natural enemy, Am. Nat., 178 (2011), 333–342. https://doi.org/10.1086/661247 doi: 10.1086/661247
    [16] D. E. Campo-Duarte, O. Vasilieva, D. Cardona-Salgado, M. Svinin, Optimal control approach for establishing wMelPop Wolbachia infection among wild Aedes aegypti populations, J. Math. Biol., 76 (2018), 1907–1950. https://doi.org/10.1007/s00285-018-1213-2 doi: 10.1007/s00285-018-1213-2
    [17] J. Farkas, S. Gourley, R. Liu, A.-A. Yakubu, Modelling Wolbachia infection in a sex-structured mosquito population carrying West Nile virus, J. Math. Biol., 75 (2017), 621–647. https://doi.org/10.1007/s00285-017-1096-7 doi: 10.1007/s00285-017-1096-7
    [18] C. Ferreira, Aedes aegypti and Wolbachia interaction: population persistence in an environment changing, Theor. Ecol., 13 (2020), 137–148. https://doi.org/10.1007/s12080-019-00435-9 doi: 10.1007/s12080-019-00435-9
    [19] B. Zheng, M. Tang, J. Yu, Modeling Wolbachia spread in mosquitoes through delay differential equations, SIAM J. Appl. Math., 74 (2014), 743–770. https://doi.org/10.1137/13093354X doi: 10.1137/13093354X
    [20] A. Adekunle, M. Meehan, E. McBryde, Mathematical analysis of a Wolbachia invasive model with imperfect maternal transmission and loss of Wolbachia infection, Infect. Dis. Model., 4 (2019), 265–285. https://doi.org/10.1016/j.idm.2019.10.001 doi: 10.1016/j.idm.2019.10.001
    [21] L. Almeida, M. Duprez, Y. Privat, N. Vauchelet, Mosquito population control strategies for fighting against arboviruses, Math. Biosci. Eng., 16 (2019), 6274–6297. https://doi.org/10.3934/mbe.2019313 doi: 10.3934/mbe.2019313
    [22] P.-A. Bliman, M. S. Aronna, F. Coelho, M. da Silva, Ensuring successful introduction of Wolbachia in natural populations of Aedes aegypti by means of feedback control, J. Math. Biol., 76 (2018), 1269–1300. https://doi.org/10.1007/s00285-017-1174-x doi: 10.1007/s00285-017-1174-x
    [23] L. Xue, C. Manore, P. Thongsripong, J. Hyman, Two-sex mosquito model for the persistence of Wolbachia, J. Biol. Dyn., 11 (2017), 216–237. https://doi.org/10.1080/17513758.2016.1229051 doi: 10.1080/17513758.2016.1229051
    [24] J. Farkas, P. Hinow, Structured and unstructured continuous models for Wolbachia infections, Bull. Math. Biol., 72 (2010), 2067–2088. https://doi.org/10.1007/s11538-010-9528-1 doi: 10.1007/s11538-010-9528-1
    [25] I. Dorigatti, C. McCormack, G. Nedjati-Gilani, N. Ferguson, Using Wolbachia for dengue control: insights from modelling, Trends Parasitol., 34 (2018), 102–113. https://doi.org/10.1016/j.pt.2017.11.002 doi: 10.1016/j.pt.2017.11.002
    [26] H. Dutra, M. Rocha, F. Dias, S. Mansur, E. Caragata, L. Moreira, Wolbachia blocks currently circulating Zika virus isolates in Brazilian Aedes aegypti mosquitoes, Cell Host Microbe, 19 (2016), 771–774. https://doi.org/10.1016/j.chom.2016.04.021 doi: 10.1016/j.chom.2016.04.021
    [27] N. Ferguson, D. Kien, H. Clapham, R. Aguas, V. Trung, T. Chau, et al., Modeling the impact on virus transmission of Wolbachia-mediated blocking of dengue virus infection of Aedes aegypti, Sci. Transl. Med., 7 (2015), 279ra37–279ra37.
    [28] M. Woolfit, I. Iturbe-Ormaetxe, J. Brownlie, T. Walker, M. Riegler, A. Seleznev, et al., Genomic evolution of the pathogenic Wolbachia strain, wMelPop, Genome Biol. Evol., 5 (2013), 2189–2204. https://doi.org/10.1093/gbe/evt169 doi: 10.1093/gbe/evt169
    [29] H. Yeap, P. Mee, T. Walker, A. Weeks, S. O'Neill, P. Johnson, et al., Dynamics of the "popcorn" Wolbachia infection in outbred Aedes aegypti informs prospects for mosquito vector control, Genetics, 187 (2011), 583–595. https://doi.org/10.1534/genetics.110.122390 doi: 10.1534/genetics.110.122390
    [30] S.-B. Hsu, H. Smith, P. Waltman, Competitive exclusion and coexistence for competitive systems on ordered Banach spaces, Trans. Am. Math. Soc., 348 (1996), 4083–4094. https://doi.org/10.1090/S0002-9947-96-01724-2 doi: 10.1090/S0002-9947-96-01724-2
    [31] O. E. Escobar-Lasso, O. Vasilieva, A simplified monotone model of Wolbachia invasion encompassing Aedes aegypti mosquitoes, Stud. Appl. Math., 146 (2021), 565–585.
    [32] H. Smith, Monotone Dynamical Systems: An Introduction to the Theory of Competitive and Cooperative Systems, vol. 41 of Mathematical Surveys and Monographs, American Mathematical Society, Providence RI, USA, 1995.
    [33] J. Jiang, X. Liang, X.-Q. Zhao, Saddle-point behavior for monotone semiflows and reaction–diffusion models, J. Differ. Equ., 203 (2004), 313–330. https://doi.org/10.1016/j.jde.2004.05.002 doi: 10.1016/j.jde.2004.05.002
    [34] U. Boscain, B. Piccoli, Optimal syntheses for control systems on 2-D manifolds, vol. 43 of Mathématiques & Applications, Springer-Verlag, Berlin, Germany, 2004.
    [35] H. Sussmann, Regular synthesis for time-optimal control of single-input real analytic systems in the plane, SIAM J. Control Optim., 25 (1987), 1145–1162. https://doi.org/10.1137/0325062 doi: 10.1137/0325062
    [36] H. Sussmann, The structure of time-optimal trajectories for single-input systems in the plane: the c nonsingular case, SIAM J. Control Optim., 25 (1987), 433–465. https://doi.org/10.1137/0325025 doi: 10.1137/0325025
    [37] H. Sussmann, The structure of time-optimal trajectories for single-input systems in the plane: the general real analytic case, SIAM J. Control Optim., 25 (1987), 868–904. https://doi.org/10.1137/0325048 doi: 10.1137/0325048
    [38] P.-A. Bliman, A feedback control perspective on biological control of dengue vectors by Wolbachia infection, Eur. J. Contr., 59 (2021), 188–206. https://doi.org/10.1016/j.ejcon.2020.09.006 doi: 10.1016/j.ejcon.2020.09.006
    [39] H. Aida, H. Dieng, T. Satho, A. Nurita, M. Salmah, F. Miake, et al., The biology and demographic parameters of Aedes albopictus in northern peninsular Malaysia, Asian Pac. J. Trop. Biomed., 1 (2011), 472–477. https://doi.org/10.1016/S2221-1691(11)60103-2 doi: 10.1016/S2221-1691(11)60103-2
    [40] D. Angeli, E. Sontag, Monotone control systems, IEEE Trans. Automat. Contr., 48 (2003), 1684–1698. https://doi.org/10.1109/TAC.2003.817920 doi: 10.1109/TAC.2003.817920
    [41] J. H. Arias-Castro, H. J. Martinez-Romero, O. Vasilieva, Biological and chemical control of mosquito population by optimal control approach, Games, 11 (2020), 62. https://doi.org/10.3390/g11040062 doi: 10.3390/g11040062
    [42] P.-A. Bliman, D. Cardona-Salgado, Y. Dumont, O. Vasilieva, Implementation of control strategies for sterile insect techniques, Math. Biosci., 314 (2019), 43–60. https://doi.org/10.1016/j.mbs.2019.06.002 doi: 10.1016/j.mbs.2019.06.002
    [43] M. H. Chan, P. S. Kim, Modelling a Wolbachia invasion using a slow–fast dispersal reaction–diffusion approach, Bull. Math. Biol., 75 (2013), 1501–1523. https://doi.org/10.1007/s11538-013-9857-y doi: 10.1007/s11538-013-9857-y
    [44] D. Cianci, J. Van Den Broek, B. Caputo, F. Marini, D. Torre, H. Heesterbeek, et al., Estimating mosquito population size from mark–release–recapture data, J. Med. Entomol., 50 (2013), 533–542. https://doi.org/10.1603/ME12126 doi: 10.1603/ME12126
    [45] P. Crain, J. Mains, E. Suh, Y. Huang, P. Crowley, S. Dobson, Wolbachia infections that reduce immature insect survival: Predicted impacts on population replacement, BMC Evol. Biol., 11 (2011), 290. https://doi.org/10.1186/1471-2148-11-290 doi: 10.1186/1471-2148-11-290
    [46] S. De Oliveira, D. Villela, F. Dias, L. Moreira, R. de Freitas, How does competition among wild type mosquitoes influence the performance of Aedes aegypti and dissemination of Wolbachia pipientis?, PLoS Negl. Trop. Dis., 11 (2017), e0005947.
    [47] H. Delatte, G. Gimonneau, A. Triboire, D. Fontenille, Influence of temperature on immature development, survival, longevity, fecundity, and gonotrophic cycles of Aedes albopictus, vector of chikungunya and dengue in the Indian Ocean, J. Med. Entomol., 46 (2009), 33–41. https://doi.org/10.1603/033.046.0105 doi: 10.1603/033.046.0105
    [48] J.-T. Gong, Y. Li, T.-P. Li, Y. Liang, L. Hu, D. Zhang, et al., Stable introduction of plant-virus-inhibiting Wolbachia into plant hoppers for rice protection, Curr. Biol., 30 (2020), 4837–4845. https://doi.org/10.1016/j.cub.2020.09.033 doi: 10.1016/j.cub.2020.09.033
    [49] L. Gouagna, J.-S. Dehecq, D. Fontenille, Y. Dumont, S. Boyer, Seasonal variation in size estimates of Aedes albopictus population based on standard mark-release-recapture experiments in an urban area on Reunion Island, Acta Trop., 143 (2015), 89–96. https://doi.org/10.1016/j.actatropica.2014.12.011 doi: 10.1016/j.actatropica.2014.12.011
    [50] L. Perko, Differential Equations and Dynamical Systems, Texts in Applied Mathematics, Springer, New York, USA, 2013.
    [51] A. C. Pimentel, C. S. Cesar, M. Martins, R. Cogni, The antiviral effects of the symbiont bacteria Wolbachia in insects, Front. Immunol., 11 (2021), 3690. https://doi.org/10.3389/fimmu.2020.626329 doi: 10.3389/fimmu.2020.626329
    [52] E. Pliego-Pliego, O. Vasilieva, J. Velázquez-Castro, A. Fraguela-Collar, Control strategies for a population dynamics model of Aedes aegypti with seasonal variability and their effects on dengue incidence, Appl. Math. Model., 81 (2020), 296–319.
    [53] H. Smith, Monotone dynamical systems: Reflections on new advances & applications, Discrete Contin. Dyn. Syst. Ser. A, 37 (2017), 485–504.
    [54] L. Styer, S. Minnick, A. Sun, T. Scott, Mortality and reproductive dynamics of Aedes aegypti (Diptera: Culicidae) fed human blood, Vector Borne Zoonotic Dis., 7 (2007), 86–98. https://doi.org/10.1089/vbz.2007.0216 doi: 10.1089/vbz.2007.0216
    [55] E. Suh, S. Dobson, Reduced competitiveness of Wolbachia infected Aedes aegypti larvae in intra-and inter-specific immature interactions, J. Invertebr. Pathol., 114 (2013), 173–177.
  • This article has been cited by:

    1. Dengfeng Lu, Shuwei Dai, On existence results for a class of biharmonic elliptic problems without (AR) condition, 2024, 9, 2473-6988, 18897, 10.3934/math.2024919
  • Reader Comments
  • © 2023 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2510) PDF downloads(106) Cited by(2)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog